Call us: 0800 3167566

KNOWLEDGE HUB

IT GLOSSARY

Our IT glossary contains all the related terminology specific to IT and Microsoft Applications

A

  • Acronis

    Acronis Backup is designed to safeguard critical data, applications, and systems from data loss, cyber threats, and other disasters.

  • Active Directory

    Active Directory (AD) is a directory service that functions as a centralised and standardised system for managing and organising information.

  • Azure

    Microsoft Azure is a comprehensive cloud computing platform empowering businesses to build, deploy, and manage applications and services.

  • Azure Virtual Desktop (AVD)

    Azure Virtual Desktop is a cloud-based desktop and application virtualisation service. It enables users to access a virtualised Windows experience from virtually any device.

  • Azure Virtual WAN

    Azure Virtual WAN is a networking service provided by Microsoft Azure, offering a streamlined and automated solution for connecting branch offices, data centres, and the Azure cloud.

↑ Back to the top

B

  • Backup

    Secure backup systematically and securely copies and stores data to facilitate recovery in case of accidental deletion, data corruption, hardware failure, or other unforeseen events.

  • Business Continuity Plan (BCP)

    Business Continuity Planning (BCP) refers to an organisation's capability to maintain critical functions, operations, and services during and after disruptions or emergencies.

↑ Back to the top

C

  • Cisco Meraki Networking

    Cisco Meraki is a cloud networking platform that includes wireless access points, cloud-managed switches, SD-WAN solutions, endpoint management, and location analytics.

  • Cloud Backup

    Cloud backup refers to the practice of securely storing copies of important data and files in an offsite server or data centre hosted by a third-party service provider.

  • Cloud Computing

    Cloud computing provides computing services over the internet, eliminating the need for physical hardware ownership. The benefits of cloud computing are substantial.

  • Cloud Migration

    Cloud migration is the process of transferring digital assets, including data, applications, and IT processes, from on-premises infrastructure to a cloud computing environment.

  • Cyber Essentials

    Cyber Essentials is a robust, government-endorsed initiative designed to safeguard businesses of all sizes from a diverse range of common cyber threats.

  • Cyber Essentials Plus

    Cyber Essentials Plus involves a two-step process: initiating the online assessment and undergoing a subsequent technical systems audit by an accredited assessor.

  • Cyber Security

    Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.

  • Cyber Security Audit

    A cyber security audit systematically reviews an organisation's information systems, processes and policies to assess cybersecurity measures.

↑ Back to the top

D

  • Dark Web Monitoring

    Dark Web Monitoring proactively searches information circulating on the dark web. This involves identifying compromised or leaked data and other highly sensitive information.

  • Defender

    Microsoft Defender is a comprehensive antivirus and anti-malware software designed to provide real-time protection against various threats.

  • Disaster Recovery

    Disaster recovery encompasses a comprehensive set of strategies and processes geared towards the swift and efficient restoration of IT systems, data, and operations following a disruptive event.

  • Dynamics 365

    Microsoft Dynamics 365 is a suite of intelligent business applications, integrating Customer Relationship Management (CRM) and Enterprise Resource Planning (ERP).

↑ Back to the top

E

  • Edge Security

    Edge security is focused on protecting the entry and exit points of a network, where data traffic enters or leaves an organisation.

  • Email Security

    Email security involves implementing measures to safeguard email communication systems from cyber threats and unauthorised access.

  • Endpoint Protection

    Endpoint protection involves safeguarding devices equipped with a security client from potential malicious threats and cyberattacks.

  • Enterprise Mobility Management (EMM)

    Enterprise Mobility Management (EMM) is the set of technologies, processes, and policies designed to manage and secure mobile devices, networks, and applications within a business.

  • Ethernet

    Ethernet is a technology used for connecting computers, servers, routers, switches, and other network devices within a local area network (LAN) in a larger network infrastructure.

  • Exclaimer

    Exclaimer manages Exchange signatures across various devices. It seamlessly incorporates signatures into all emails processed through Exchange, regardless of the email client or the device used.

↑ Back to the top

F

  • Firewalls

    A firewall is a network security system designed to monitor, control, and manage incoming and outgoing network traffic based on predetermined security rules.

  • Firmware

    Firmware is a software that is embedded in electronic devices to control and manage the device's specific hardware.

↑ Back to the top

H

  • Hybrid Backup

    Hybrid backup refers to a data backup strategy that combines elements of both local (on-premises) and cloud-based backup solutions.

↑ Back to the top

I

  • Infrastructure as a Service

    Infrastructure as a Service (IaaS) is a cloud computing model that provides virtualised computing resources over the internet.

  • IT Consultancy

    IT consultancy refers to the professional service provided by experts in the field of information technology to assist organisations in leveraging technology to achieve their business objectives.

  • IT Glue

    IT Glue is a cloud-based IT documentation platform designed to help managed service providers (MSPs) and IT professionals organise, centralise and streamline their IT documentation.

  • IT Governance

    IT governance refers to the framework of policies, processes, and decision-making structures that guide and ensure the effective and efficient use of information technology (IT) within an organisation.

  • IT Infrastructure

    IT infrastructure is the collection of hardware, software, networks, facilities, and other components that support the overall operation and functionality of an organisation's IT environment.

  • IT Outsourcing

    IT outsourcing refers to the practice of contracting out certain information technology functions or services to external service providers.

  • IT Service Desk

    An IT service desk, also known as a help desk, serves as a centralised point of contact within an organisation, providing support and assistance to end-users facing IT-related issues or service requests.

  • IT Strategy

    An IT strategy is a comprehensive plan outlining how an organisation will use information technology to achieve its business objectives.

↑ Back to the top

M

  • Malware

    Malware, short for malicious software, refers to any software specifically designed to harm, exploit, or compromise computer systems, networks, or user devices.

  • Managed Cloud

    Managed Cloud is a cloud computing service where a third-party provider takes responsibility for the management, security, and optimisation of cloud infrastructure on behalf of the client.

  • Managed IT

    Managed IT is when a business chooses to outsourcing their IT infrastructure, support, services, and systems to a third-party provider, known as a Managed Service Provider (MSP).

  • Managed Service Provider (MSP)

    A Managed Service Provider (MSP) is a third-party company that delivers a range of IT services and support to businesses, typically on a subscription or outsourcing model.

  • Managed Service Security Provider (MSSP)

    A Managed Security Service Provider (MSSP) is a specialised third-party company that offers comprehensive cybersecurity services to organisations.

  • Microsoft 365

    Microsoft 365 is a comprehensive suite of cloud-based productivity tools and services provided by Microsoft.

  • Microsoft Exchange

    Microsoft Exchange is a messaging and collaborative platform developed by Microsoft. Applications for email, calendaring, task management, contact management, and more.

  • Microsoft Solutions Partner

    Microsoft Solution Partners possess extensive technical capabilities, a commitment to skill development and training, and a proven track record of in specific Microsoft Cloud solution areas.

  • Mimecast

    Mimecast provides cloud cyber security services that safeguard essential communications, individuals and data ensuring the security of vital information.

↑ Back to the top

N

  • Network as a Service (NaaS)

    NaaS stands for Network as a Service, a cloud computing model that delivers networking services over the internet.

↑ Back to the top

O

  • Outsourced IT

    Outsourced IT is when a business chooses to outsource all or part of their IT function to a Managed Service Provider.

↑ Back to the top

P

  • Phishing

    Phishing is a type of cyber attack in which attackers use deceptive techniques to trick individuals into providing sensitive information.

↑ Back to the top

R

  • Ransomware

    Ransomware is a type of malware designed to encrypt a user's files or lock them out of their computer system, rendering the data inaccessible without a paid ransom.

  • Remote Backup

    Remote backup, also known as online or cloud backup, involves securely storing data on an offsite server or cloud platform using the internet.

↑ Back to the top

S

  • SD-WAN

    SD-WAN, short for Software-Defined Wide Area Network, is a virtual architecture designed to empower enterprises with the flexibility to utilise various transport services.

  • Server

    A server is a computer or system that is dedicated to managing and facilitating network resources and services.

  • Sharepoint

    SharePoint is a cloud collaboration platform integrated with Microsoft 365. It is used for storing, organising, sharing, and accessing information from any device with a web browser.

  • Software as a Service (SaaS)

    Software as a Service (SaaS) is a cloud computing model that delivers software applications over the internet on a subscription basis.

  • SoGEA

    SoGEA broadband is a type of internet connection that provides high-speed access to the internet and does not include a traditional landline phone service.

↑ Back to the top

T

  • Teams

    Microsoft Teams is a collaboration platform developed by Microsoft as part of its Microsoft 365 suite of productivity tools.

  • Threat Protection

    Threat protection is a set of security measures and technologies designed to detect, prevent, and respond to various cyber security threats that can compromise the integrity of information systems and data.

  • Two Factor Authentication (2FA)

    Two-Factor Authentication (2FA) is a security process that requires users to provide two different authentication factors to verify their identity.

↑ Back to the top

V

  • Virtual Server

    A virtual server, also known as a virtual machine, is a software-based emulation of a physical computer.

↑ Back to the top

Z

  • Zero Trust Security

    Zero Trust security represents a comprehensive IT security model that mandates rigorous identity verification for every individual and device seeking access within a private network.

↑ Back to the top